General

  • Target

    dd1d3dde09e39adc72d966761dd7252fa0fd27f837ea999aa3a9a4cc66508c40

  • Size

    120KB

  • MD5

    c07f7316600126153bf3c3dce223fcd2

  • SHA1

    1ea86a1ece6bd48e8973326204fc15a2dd7d35ab

  • SHA256

    dd1d3dde09e39adc72d966761dd7252fa0fd27f837ea999aa3a9a4cc66508c40

  • SHA512

    1a66f60abba232e650877fb4aed4bd5a40f07c88b6149c8d772406a7d0515d38bdc1be5a610e073a550a5920299a5434119fd7e890fcb4eaa6b8a3c4ed1076e6

  • SSDEEP

    3072:ii6L1KoPUG7fzR5l5nHvn/Ae2ov164jmqMVcqWl2njTm:ii61lTzrLAe2AmqMVcqWl2njTm

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • dd1d3dde09e39adc72d966761dd7252fa0fd27f837ea999aa3a9a4cc66508c40
    .elf linux x86